A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System


Chaudhry S. A., Irshad A., Khan M. A., Khan S. A., Nosheen S., Alzubi A. A., ...Daha Fazla

IEEE Transactions on Intelligent Transportation Systems, cilt.24, sa.2, ss.2401-2410, 2023 (SCI-Expanded) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 24 Sayı: 2
  • Basım Tarihi: 2023
  • Doi Numarası: 10.1109/tits.2021.3134643
  • Dergi Adı: IEEE Transactions on Intelligent Transportation Systems
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Aerospace Database, Communication Abstracts, Compendex, INSPEC, Metadex, Civil Engineering Abstracts
  • Sayfa Sayıları: ss.2401-2410
  • Anahtar Kelimeler: 6G mobile communication, Drones, Authentication, Security, Internet of Things, Transportation, Satellites, Device access control, maritime transportation system, device impersonation, forged message, IoT access
  • İstanbul Teknik Üniversitesi Adresli: Evet

Özet

The Sixth-Generation (6G) mobile network has the potential to provide not only traditional communication services but also additional processing, caching, sensing, and control capabilities to a massive number of Internet of Things (IoT) devices. Meanwhile, a 6G mobile network may provide global coverage and diverse quality-of-service provisioning to the Maritime Transportation System (MTS) when enabled through satellite systems. Although modern MTS has gained significant benefits from Internet of Things (IoT) and 6G technologies, threats and challenges in terms of security and privacy have also been grown substantially. Tracking the location of vessels, GPS spoofing, unauthorized access to data, and message tampering are some of the potential security and privacy vulnerabilities in the 6G-IoT enabled MTS. In this article, we propose a lightweight authentication protocol for a 6G-IoT enabled maritime transportation system to efficiently assist and ensure the security and privacy of maritime transportation systems. To validate the security characteristics, formal security assessment methods are utilized, i.e., Real-Or-Random (ROR) oracle model. The findings of the security analysis show that the proposed scheme is more secure than the existing schemes.